Trojan.GenericKD.3595684_de34e9e89a
Trojan.Win32.Inject.abmjh (Kaspersky), Trojan.GenericKD.3595684 (AdAware), Trojan.NSIS.StartPage.FD, SearchProtectToolbar_pcap.YR, SearchProtectToolbar.YR, PUPSpigot.YR (Lavasoft MAS)
Behaviour: Trojan, PUP
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: de34e9e89a8d9bbd5fa6e13afc11247d
SHA1: db04ede5c86b4aa7c59044b0e1a47675513a23de
SHA256: 8e617ad604bcc4eebb66c473aac317b4be4127b811f58b2c2eb7e1f98ea1533b
SSDeep: 49152:cXaWI4GO/rdRKkWfD9YIFFFYXZNw61xjgX5uEAJEWO9iN0W1p8bD:OatOzdBWfD9giORgX5uEAu4ylf
Size: 2943990 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2009-02-21 21:46:34
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:4088
mshta.exe:992
The Trojan injects its code into the following process(es):
uTorrent.exe:832
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process uTorrent.exe:832 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\ru.json (9 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\index.hta (617 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\shell_scripts\shell_install_offer.js (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\common.js (350 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\shell_scripts\check_if_cscript_is_working.js (18 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\br.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\en.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_icon.png (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\de.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\styles\common.css (102 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\3rdparty\FS.dll (933 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\it.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\loading.gif (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\install.js (15 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\index.hta.log (26 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\uTorrent\settings.dat.new (73 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-732923889-1296844034-1208581001-1000\1f91d2d17ea675d4c2c3192e241743f9_88dcd395-b062-45b3-a6cd-79f37c0eba08 (105 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\uninstall.js (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\utt340B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\bt_icon_48px.png (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\pt.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\styles\installer.css (587 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\V5XZY3MU.txt (89 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\search_protect.png (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\yandex_horz_ru.png (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\fr.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\logo_Yandex_RU_UA_vertical.png (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\shell_scripts\shell_ping_after_close.js (312 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\install.1479015136.zip (283430 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_bittorrent.ico (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\initialize.js (978 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\es5-shim.js (11 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\es.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\yandex_horz.png (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\ZJ9R2LUM.txt (89 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\3rdparty\FS.ocx (499 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_utorrent.ico (107 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\yandex_browser_setup.bmp (204 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\uninstall.hta (575 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\V5XZY3MU.txt (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\utt340B.tmp (0 bytes)
The process %original file name%.exe:4088 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2CFA.tmp (97124 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\vrego.exe (33391 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\uTorrent.exe (70641 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nss2C2E.tmp (0 bytes)
The process mshta.exe:992 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\30EV4AVE\CA7KAXAO.HTM (2029 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_utorrent.ico (110 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\json[1].js (321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\index.hta.log (33 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\CAJT90MW.HTM (1979 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\CAJT90MW.HTM (0 bytes)
Registry activity
The process uTorrent.exe:832 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Classes\FalconBetaAccount]
"remote_access_client_id" = "5795958871"
[HKCU\Software\Classes\Local Settings\MuiCache\2F\52C64B7E]
"LanguageList" = "en-US, en"
[HKCU\Software\BitTorrent\uTorrent]
"OfferProvider" = ""
"OfferViaCAU" = "0"
"OfferName" = ""
"OfferAccepted" = "0"
The process mshta.exe:992 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad]
"WpadLastNetwork" = "{24C5EDBC-2851-452A-B521-5DA992F6C1B5}"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1299588363"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"DefaultConnectionSettings" = "46 00 00 00 09 00 00 00 09 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadDecision" = "3"
"WpadDecisionTime" = "D0 42 83 57 6F 3D D2 01"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "mshta.exe"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecision" = "3"
"WpadDecisionReason" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "46 00 00 00 36 00 00 00 09 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadNetworkName" = "Network 2"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{24C5EDBC-2851-452A-B521-5DA992F6C1B5}]
"WpadDecisionReason" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\mshta_RASMANCS]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\00-50-56-e1-da-d8]
"WpadDecisionTime" = "D0 42 83 57 6F 3D D2 01"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan deletes the following registry key(s):
[HKLM\SOFTWARE\Microsoft\Code Store Database\NT5LockDownTest]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyServer"
"ProxyOverride"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
Dropped PE files
| MD5 | File path |
|---|---|
| eaba486ca44ce139b1a6c2520fe61837 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\3rdparty\FS.dll |
| eed49c88dba5f2aa10cbd3acf66d899d | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\3rdparty\FS.ocx |
| 187f54c7371ffc2b31a082f8b6ce8682 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\uTorrent.exe |
| b184f59e2c565aefe18a952ad5c57daf | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\vrego.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 23126 | 23552 | 4.44793 | 7e9e633fd2aedade49bf819fab33d557 |
| .rdata | 28672 | 4496 | 4608 | 3.58909 | db16645055619c0cc73276ff5c3adb75 |
| .data | 36864 | 110488 | 1024 | 3.26405 | a59d6ff4f72ca84cc2dea3b332090bfb |
| .ndata | 147456 | 32768 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rsrc | 180224 | 108424 | 108544 | 5.08652 | 23e4b86258a850b91dd717fe6b07dca2 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://com-utorrent-prod-bench-290894750.us-east-1.elb.amazonaws.com/e?i=50 | |
| hxxp://download-new.utorrent.com/endpoint/hydra-ut/os/win7/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/6.1/enc-ver/110208465/ | |
| hxxp://ip-api.com/json?callback=jQuery19104783731537734034_1479015148189&_=1479015148190 | |
| hxxp://i-50.b-000.xyz.bench.utorrent.com/e?i=50 | |
| hxxp://download-lb.utorrent.com/endpoint/hydra-ut/os/win7/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/6.1/enc-ver/110208465/ | |
| router.utorrent.com | |
| router.bittorrent.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET SHELLCODE Possible TCP x86 JMP to CALL Shellcode Detected
ET POLICY External IP Lookup ip-api.com
Traffic
GET /json?callback=jQuery19104783731537734034_1479015148189&_=1479015148190 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0E; .NET4.0C)
Host: ip-api.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Content-Type: text/javascript; charset=utf-8
Date: Sun, 13 Nov 2016 05:32:36 GMT
Content-Length: 321jQuery19104783731537734034_1479015148189({"as":"AS31561 PITLINE-AS","c
ity":"Kharkiv","country":"Ukraine","countryCode":"UA","isp":"Pitline L
td","lat":49.9808,"lon":36.2527,"org":"Pitline Ltd","query":"194.242.9
6.226","region":"63","regionName":"Kharkivs'ka Oblast'","status":"succ
ess","timezone":"Europe/Kiev","zip":""});HTTP/1.1 200 OK..Access-Contr
ol-Allow-Origin: *..Content-Type: text/javascript; charset=utf-8..Date
: Sun, 13 Nov 2016 05:32:36 GMT..Content-Length: 321..jQuery1910478373
1537734034_1479015148189({"as":"AS31561 PITLINE-AS","city":"Kharkiv","
country":"Ukraine","countryCode":"UA","isp":"Pitline Ltd","lat":49.980
8,"lon":36.2527,"org":"Pitline Ltd","query":"194.242.96.226","region":
"63","regionName":"Kharkivs'ka Oblast'","status":"success","timezone":
"Europe/Kiev","zip":""});..
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 269
{"eventName":"hydra1","action":"INFO","type":"i","res":"1916x902","cts":"1479015146","pv":"","cau":"0","cc":"0","bkt1":"0","ssb":"11","v":"110208465","cl":"uTorrent","osv":"6.1","l":"en","pid":"832","h":"utoimstic5YaH0wf","sid":"utoimstic5YaH0wf1479015136","order":"3"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Sun, 13 Nov 2016 05:32:26 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
GET /endpoint/hydra-ut/os/win7/track/stable/browser/ie/os-region/US/os-lang/en/os-ver/6.1/enc-ver/110208465/ HTTP/1.1
Host: download-lb.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 0
HTTP/1.1 200 OK
Server: nginx/1.6.1
Date: Sun, 13 Nov 2016 05:32:17 GMT
Content-Type: application/octet-stream
Content-Length: 2433394
Connection: close
X-bt-sig: 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
Last-Modified: Wed, 26 Oct 2016 01:55:28 0000
Accept-Ranges: none
Content-Disposition: attachment; filename="hta.zip"
X-bt-size: 2433394
Cache-Control: private
X-rl-mx: true
Rule-UUID: de7f6050-4f7c-45cf-a888-37b23152e2e9
Content-MD5: a2929026e7bb88527b8fae3606ec75fa
Expires: Tue, 01 Jan 1980 00:00:00 0000
X-bt-hash: 827ff98342a0f809fee80ea0dd3a701d77d2578dPK.........[YIF1~ti...i.......index.hta<html>..<head>.
<title>Loading...</title>. <meta charset="utf-8">
. <meta http-equiv="X-UA-Compatible" content="IE=9">. <
meta http-equiv="MSThemeCompatible" content="yes">.. <script
src="scripts/initialize.js"></script>.. <link rel="styl
esheet" href="styles/common.css"/>.. <!--[if lte IE 8]>.
<script src="scripts/es5-shim.js"></script>. <![en
dif]-->..</head>..<body class="installer_body">. <
;!-- this is the loading img while loading offer page -->. <d
iv id='loading_img'></div>.</body>..<script src="scr
ipts/common.js"></script>..<script src="scripts/install.js
"></script>..</html>.PK.........[YIw[Yy?...?.......unin
stall.hta<html>..<head>. <title>Loading...</ti
tle>. <meta charset="utf-8">. <meta http-equiv="X-UA
-Compatible" content="IE=9">. <meta http-equiv="MSThemeCompat
ible" content="yes">.. <script src="scripts/initialize.js">
;</script>.. <link rel="stylesheet" href="styles/common.cs
s"/>... <!--[if lte IE 8]>. <script language="ja
vascript" type="text/javascript" src='scripts/es5-shim.js'></scr
ipt>. <![endif]-->..</head>..<body class="install
er_body">.</body>..<script src="scripts/common.js"><
/script>...<script src="scripts/uninstall.js"></script<<< skipped >>>
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 260
{"eventName":"hydra1","action":"packDownloadResult","type":"i","result":"1","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"11","v":"110208465","cl":"uTorrent","osv":"6.1","l":"en","pid":"832","h":"utoimstic5YaH0wf","sid":"utoimstic5YaH0wf1479015136","order":"2"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Sun, 13 Nov 2016 05:32:26 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 233
{"eventName":"hydra1","action":"begin","type":"i","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"1","v":"110208465","cl":"uTorrent","osv":"6.1","l":"en","pid":"832","h":"utoimstic5YaH0wf","sid":"utoimstic5YaH0wf1479015136","order":"0"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Sun, 13 Nov 2016 05:32:16 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
POST /e?i=50 HTTP/1.1
Host: i-50.b-000.xyz.bench.utorrent.com
User-Agent: Hydra HttpRequest
Connection: close
Content-Length: 247
{"eventName":"hydra1","action":"packDownloadStarted","type":"i","cau":"0","pv":"","cc":"0","bkt1":"0","ssb":"1","v":"110208465","cl":"uTorrent","osv":"6.1","l":"en","pid":"832","h":"utoimstic5YaH0wf","sid":"utoimstic5YaH0wf1479015136","order":"1"}
HTTP/1.1 200 OK
Content-Type: text/html
Date: Sun, 13 Nov 2016 05:32:16 GMT
Server: nginx
X-Powered-By: PHP/5.4.30
Content-Length: 21
Connection: Close{"response_code":200}..
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.ndata
.rsrc
uDSSh
.DEFAULT\Control Panel\International
Software\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
SHFileOperationA
ShellExecuteA
SHELL32.dll
RegEnumKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
ADVAPI32.dll
COMCTL32.dll
ole32.dll
VERSION.dll
verifying installer: %d%%
unpacking data: %d%%
... %d%%
hXXp://nsis.sf.net/NSIS_Error
~nsu.tmp
%u.%u%s%s
RegDeleteKeyExA
%s=%s
*?|<>/":
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\uTorrent.exe
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\vrego.exe
7-747v7}7
< <$<<<@<
9 9$9(9,9094989<9@9
1/2g2
: :$:(:,:0:4:8:<:@:
4.CWP
!'<.el
nsn2D49.tmp
:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp
c:\%original file name%.exe
%original file name%.exe
ers\"%CurrentUserName%"\AppData\Local\Temp\nss2C2E.tmp
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\
%CqXo
}.cK?
{-.uZ\Zx%FO>
.LY"M
AutoIt supports the __stdcall (WINAPI) and __cdecl calling conventions. The __stdcall (WINAPI) convention is used by default but __cdecl can be used instead. See the DllCall() documentation for details on changing the calling convention.
Missing operator in expression."Unbalanced brackets in expression.
mshta.exe_992:
.text
`.data
.rsrc
@.reloc
clsid\{25336920-03f9-11cf-8fd0-00aa00686f13}\InProcServer32msvcrt.dll
KERNEL32.dll
ADVAPI32.dll
RegCloseKey
RegOpenKeyExA
_amsg_exit
_acmdln
mshta.pdb
name="Microsoft.Windows.InetCore.mshta"
version="5.1.0.0"
<asmv3:windowsSettings xmlns="hXXp://schemas.microsoft.com/SMI/2005/WindowsSettings">
</asmv3:windowsSettings>
Kernel32.dll
2kernel32.dll
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
MSHTA.EXE
Windows
9.00.8112.16421
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:4088
mshta.exe:992 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\ru.json (9 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\index.hta (617 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\shell_scripts\shell_install_offer.js (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\common.js (350 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\shell_scripts\check_if_cscript_is_working.js (18 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\br.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\en.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_icon.png (4 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\de.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\styles\common.css (102 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\3rdparty\FS.dll (933 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\it.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\loading.gif (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\install.js (15 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\index.hta.log (26 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\uTorrent\settings.dat.new (73 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-732923889-1296844034-1208581001-1000\1f91d2d17ea675d4c2c3192e241743f9_88dcd395-b062-45b3-a6cd-79f37c0eba08 (105 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\uninstall.js (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\utt340B.tmp (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\bt_icon_48px.png (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\pt.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\styles\installer.css (587 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\V5XZY3MU.txt (89 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\search_protect.png (3 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\yandex_horz_ru.png (7 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\fr.json (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\logo_Yandex_RU_UA_vertical.png (6 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\shell_scripts\shell_ping_after_close.js (312 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\install.1479015136.zip (283430 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_bittorrent.ico (103 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\initialize.js (978 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\scripts\es5-shim.js (11 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\i18n\es.json (5 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\yandex_horz.png (8 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\Windows\Cookies\ZJ9R2LUM.txt (89 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\3rdparty\FS.ocx (499 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\main_utorrent.ico (107 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\images\yandex_browser_setup.bmp (204 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\HYD3811.tmp.1479015136\HTA\uninstall.hta (575 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2CFA.tmp (97124 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\vrego.exe (33391 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\nsn2D49.tmp\uTorrent.exe (70641 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\30EV4AVE\CA7KAXAO.HTM (2029 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\json[1].js (321 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GPS1JHSL\CAJT90MW.HTM (1979 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.